Analysis
-
max time kernel
120s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
28/01/2024, 03:00
Static task
static1
Behavioral task
behavioral1
Sample
7bf7ddae60e01d9fe213b727d3259787.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
7bf7ddae60e01d9fe213b727d3259787.exe
Resource
win10v2004-20231222-en
General
-
Target
7bf7ddae60e01d9fe213b727d3259787.exe
-
Size
385KB
-
MD5
7bf7ddae60e01d9fe213b727d3259787
-
SHA1
d8c42b27007df48278435b2a28ba1a0dfc67c5e1
-
SHA256
82e9878850ea58e32b62315e6f4e9ba9d9cea7cae4db7717d293618bd1228934
-
SHA512
e39ac8203a2383f4e1659ffb8ee9e8e74954eab80b43fe26ca400027f742607c5c6f47a73182ad742db65b180c766c3386b14e368c895bfbc353cd2aaa694b57
-
SSDEEP
6144:oi+anJgmNb+8DyVCyhf6EO0tj5Gq7E4Tv2f+/fWbBXBWhAZG8r90/lQ1fagB:oi+al+lhhf40tj55vU+mXtZGB/eB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3328 7bf7ddae60e01d9fe213b727d3259787.exe -
Executes dropped EXE 1 IoCs
pid Process 3328 7bf7ddae60e01d9fe213b727d3259787.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 6 pastebin.com 4 pastebin.com -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 968 7bf7ddae60e01d9fe213b727d3259787.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 968 7bf7ddae60e01d9fe213b727d3259787.exe 3328 7bf7ddae60e01d9fe213b727d3259787.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 968 wrote to memory of 3328 968 7bf7ddae60e01d9fe213b727d3259787.exe 87 PID 968 wrote to memory of 3328 968 7bf7ddae60e01d9fe213b727d3259787.exe 87 PID 968 wrote to memory of 3328 968 7bf7ddae60e01d9fe213b727d3259787.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\7bf7ddae60e01d9fe213b727d3259787.exe"C:\Users\Admin\AppData\Local\Temp\7bf7ddae60e01d9fe213b727d3259787.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:968 -
C:\Users\Admin\AppData\Local\Temp\7bf7ddae60e01d9fe213b727d3259787.exeC:\Users\Admin\AppData\Local\Temp\7bf7ddae60e01d9fe213b727d3259787.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3328
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD581264897feedef36bc6b37b10c7efd24
SHA1b36f3b9f6fff75e5333e95fe5409971112a95fd9
SHA256666fa2840a5c570673a2b1d8cd11af650f3120a4df91cddac815c736420e4cbb
SHA5128437cf11515eb0fa1f9dced24c803363dc5f6831659fa3bf61c03b17c50965da2586697965d4122f3ffa7279b84c71bac68e54d8b4cd250dd12853d5a9385ddd